Cryptographic asset inventory framework
A structured framework for cataloguing every cryptographic asset across your organisation's estate. Discovery is NCSC Gate 1 — this is where it starts.
What's included
15-column inventory table — every field needed for a complete cryptographic asset register
Algorithm, key size, and protocol/usage fields
Exposure type classification (in-transit / at-rest / both)
Data sensitivity and data shelf life columns for HNDL prioritisation
HNDL risk rating and migration priority fields
Target algorithm column (ML-KEM / ML-DSA / SLH-DSA)
Status tracking and owner assignment columns
Get the framework
Enter your details to access the download
This framework covers the discovery phase — NCSC Gate 1. Once your inventory is complete, use the NCSC Milestone Tracker to advance through the remaining gates.
Need help completing the inventory?
A formal cryptographic discovery takes the guesswork out
Book a free 30-minute call. We'll walk through your estate, identify the systems most likely to carry HNDL exposure, and scope what a full discovery engagement would involve.
Book a free call